Latest posts

Hack Hall of Shame – May 2015

May has brought with it an increase in the number of attacks and many of these breaches, apart from being large in quantity are also large in quality.

Continue reading

Ten free sources to learn IT security

If you’re looking to improve your information security expertise the Internet is the place to go for fast, good and cheap training.

Continue reading

Don’t flip your bit – is RAM the next attack vector?

Hardcore hacking takes more than using an existing exploit, changing a few lines and releasing it and bit-flipping takes hacking to a whole new level.

Continue reading

Dangers of Apple Watch, Microsoft’s new Outlook, and rethinking security

This week we talk about one major security flaw in the Apple Watch, plans by the US and its allies to up their spying game and the revamp of Outlook.com.

Continue reading

Every criminal blackhat started with a first hack

Every criminal hacker started with a first hack. Whether it was guessing a friend’s password, or figuring out how to get around licensing for the latest game.

Continue reading

The evil that users do lives on and on…

In the beginning, there was the mainframe, and the IT admin was happy. He had sole access to the terminal; he dictated who used it and for how long.

Continue reading

Malware is out there and it’s up to no good

With every passing day, new exploits are found and hackers get cleverer. It’s time to turn the tables and start seeing your network the same way the bad guys do

Continue reading

Patch problems just keep on coming

Once again, in the wake of this month’s supersized patch release, we’re hearing from readers who have been experiencing problems after installing the updates.

Continue reading

Living without Google, living with Google

It’s time to talk about privacy and this week both Google and Facebook have come under fire. But what if something worse is lurking around the corner courtesy of Google?

Continue reading

Is the pen becoming mightier than the keyboard?

The keyboard and its accompanying pointing device have been the input method for the vast majority of our interactions with computers, is that ever going to change?

Continue reading